Close Menu
    Latest Post

    AI Wrapped: The 14 AI terms you couldn’t avoid in 2025

    January 6, 2026

    GPT Function Calling: 5 Underrated Use Cases

    January 6, 2026

    Stop using the wrong Gemini: The one setting you need to change for Gemini 3

    January 6, 2026
    Facebook X (Twitter) Instagram
    Trending
    • AI Wrapped: The 14 AI terms you couldn’t avoid in 2025
    • GPT Function Calling: 5 Underrated Use Cases
    • Stop using the wrong Gemini: The one setting you need to change for Gemini 3
    • Coros Nomad Review: A Robust and Affordable Outdoor Smartwatch
    • ICE Seeks Enhanced Cyber Surveillance for Employee Investigations
    • Fun graph from Peter Attia’s book Outlive
    • UK Social Media Campaigners Among Five Denied US Visas
    • Enhancing HDR on Instagram for iOS With Dolby Vision
    Facebook X (Twitter) Instagram Pinterest Vimeo
    NodeTodayNodeToday
    • Home
    • AI
    • Dev
    • Guides
    • Products
    • Security
    • Startups
    • Tech
    • Tools
    NodeTodayNodeToday
    Home»Security»Pakistan-Linked Hackers Target Indian Government and Universities in New Cyber-Espionage Campaign
    Security

    Pakistan-Linked Hackers Target Indian Government and Universities in New Cyber-Espionage Campaign

    Samuel AlejandroBy Samuel AlejandroJanuary 4, 2026No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    src 9fy1yx featured
    Share
    Facebook Twitter LinkedIn Pinterest Email

    india flag

    A hacker group aligned with Pakistan has initiated a new cyber-espionage campaign, targeting various Indian government, academic, and strategic organizations. This operation has been attributed to APT36, also known as Transparent Tribe, a persistent threat actor with a history of spying on Indian government bodies, military-related organizations, and universities.

    According to researchers at cybersecurity firm Cyfirma reported, the latest campaign commences with spear-phishing emails. These emails contain a ZIP archive that holds a malicious file disguised as a PDF. When opened, this file deploys two malware components, named ReadOnly and WriteOnly.

    The malware is designed to covertly embed itself within victims’ systems, adapting its behavior based on the installed antivirus software. Cyfirma indicates that it can remotely control infected machines, extract data, and conduct continuous surveillance. This includes capturing screenshots, monitoring clipboard activity, and enabling remote desktop access.

    Researchers noted that the clipboard monitoring capability could also be exploited to steal or alter copied data, potentially allowing attackers to hijack cryptocurrency transactions.

    The analyzed campaign highlights the group’s long-term surveillance goals rather than immediate financial gain or disruptive actions, aligning with state-sponsored intelligence-gathering priorities.

    While Transparent Tribe has previously been described by researchers as less technically advanced compared to some other espionage groups, its persistence and ability to evolve tactics over time have been recognized in past assessments.

    Cyfirma observed that the recent campaign demonstrates an advancement in APT36’s technical capabilities. These improvements include exploiting trusted Windows components, using common file formats for deception, and employing multi-stage, fileless execution techniques.

    APT36 has been active since at least 2013, with links to cyber-espionage operations targeting government and military entities in India and Afghanistan, as well as institutions in approximately 30 other countries.

    The group also shares characteristics with Cosmic Leopard, another Pakistan-linked threat actor. Cosmic Leopard was responsible for a multi-year espionage campaign against Indian government agencies and defense and technology companies, which was identified last year.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleInnovations in Fire-Blocking Chemicals Enhance Building Safety
    Next Article Yakuza Kiwami 2 on Nintendo Switch 2: A Solid Port of a Stellar RPG
    Samuel Alejandro

    Related Posts

    Security

    ICE Seeks Enhanced Cyber Surveillance for Employee Investigations

    January 6, 2026
    Security

    Nearly 480,000 impacted by Covenant Health data breach

    January 5, 2026
    Security

    SMS Phishing Scams Evolve: Targeting Rewards Points, Tax Refunds, and Fake Online Stores

    January 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Post

    ChatGPT Mobile App Surpasses $3 Billion in Consumer Spending

    December 21, 202512 Views

    Automate Your iPhone’s Always-On Display for Better Battery Life and Privacy

    December 21, 202510 Views

    Creator Tayla Cannon Lands $1.1M Investment for Rebuildr PT Software

    December 21, 20259 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    About

    Welcome to NodeToday, your trusted source for the latest updates in Technology, Artificial Intelligence, and Innovation. We are dedicated to delivering accurate, timely, and insightful content that helps readers stay ahead in a fast-evolving digital world.

    At NodeToday, we cover everything from AI breakthroughs and emerging technologies to product launches, software tools, developer news, and practical guides. Our goal is to simplify complex topics and present them in a clear, engaging, and easy-to-understand way for tech enthusiasts, professionals, and beginners alike.

    Latest Post

    AI Wrapped: The 14 AI terms you couldn’t avoid in 2025

    January 6, 20260 Views

    GPT Function Calling: 5 Underrated Use Cases

    January 6, 20260 Views

    Stop using the wrong Gemini: The one setting you need to change for Gemini 3

    January 6, 20260 Views
    Recent Posts
    • AI Wrapped: The 14 AI terms you couldn’t avoid in 2025
    • GPT Function Calling: 5 Underrated Use Cases
    • Stop using the wrong Gemini: The one setting you need to change for Gemini 3
    • Coros Nomad Review: A Robust and Affordable Outdoor Smartwatch
    • ICE Seeks Enhanced Cyber Surveillance for Employee Investigations
    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • Disclaimer
    • Cookie Policy
    © 2026 NodeToday.

    Type above and press Enter to search. Press Esc to cancel.